Ubuntu 4263-2: Sudo vulnerability

    Date 05 Feb 2020
    247
    Posted By LinuxSecurity Advisories
    Sudo could allow unintended access to the administrator account.
    ==========================================================================
    Ubuntu Security Notice USN-4263-2
    February 05, 2020
    
    sudo vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 14.04 ESM
    - Ubuntu 12.04 ESM
    
    Summary:
    
    Sudo could allow unintended access to the administrator account.
    
    Software Description:
    - sudo: Provide limited super user privileges to specific users
    
    Details:
    
    USN-4263-1 fixed a vulnerability in Sudo. This update provides
    the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
    
    Original advisory details:
    
     Joe Vennix discovered that Sudo incorrectly handled memory operations when
     the pwfeedback option is enabled. A local attacker could possibly use this
     issue to obtain unintended access to the administrator account.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 14.04 ESM:
      sudo                            1.8.9p5-1ubuntu1.5+esm3
      sudo-ldap                       1.8.9p5-1ubuntu1.5+esm3
    
    Ubuntu 12.04 ESM:
      sudo                            1.8.3p1-1ubuntu3.9
      sudo-ldap                       1.8.3p1-1ubuntu3.9
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4263-2
      https://usn.ubuntu.com/4263-1
      CVE-2019-18634
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.